Building the Infrastructure for Cloud Security: A Solutions View

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book hig...

Full description

Saved in:
Bibliographic Details
Main Author: Raghuram Yeluri (auth)
Other Authors: Enrique Castro-Leon (auth)
Format: Electronic Book Chapter
Language:English
Published: Apress 2014
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_42527
005 20210211
003 oapen
006 m o d
007 cr|mn|---annan
008 20210211s2014 xx |||||o ||| 0|eng d
020 |a /doi.org/10.1007/978-1-4302-6146-9 
020 |a 9781430261452 
020 |a 9781430261469 
040 |a oapen  |c oapen 
024 7 |a https://doi.org/10.1007/978-1-4302-6146-9  |c doi 
041 0 |a eng 
042 |a dc 
100 1 |a Raghuram Yeluri  |4 auth 
700 1 |a Enrique Castro-Leon  |4 auth 
245 1 0 |a Building the Infrastructure for Cloud Security: A Solutions View 
260 |b Apress  |c 2014 
300 |a 1 electronic resource (244 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. 
536 |a Intel 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by-nc-nd/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by-nc-nd/4.0/ 
546 |a English 
856 4 0 |a www.oapen.org  |u https://link.springer.com/book/10.1007/978-1-4302-6146-9  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/42527  |7 0  |z DOAB: description of the publication